SUMMARY: deciphering adb

From: Mike's List <mikelist_at_sky.net>
Date: Mon Jul 15 2002 - 10:29:08 EDT
Sorry for the late summary but I have to wait for the memory to arrive
and test it on the system.  It was the memory, almost most of the time,
it's gonna be the bad memory.

Thanks all.


- Mike


On Tue, 9 Jul 2002, Mike's List wrote:

> Below are results of running "adb -k unix.0 vmcore.0" and redirecting
> output of $<msgbuf and $c to a file...(along with unix.1 vmcore.1 and
> unix.2 vmcore.2)
> 
> Can anyone decipher what the below means?  Bad CPU? (don't think so)
> Faulty memory? (new memory) or Disk failure? (brand new HDs)
> 
> Workstation is newly installed with core installation, 1G RAM, 2G of
> swap, no other software/application is running --no other installation.
> System is now in reboot mode (non-stop syncing/rebooting).
> 
> Thanks.
> 
> 
> - Mike
> 
> 
> >From unix.0 vmcore.0
> --------------------
> panic[cpu1]/thread=e34957c0:
> 0xe16eca70:     BAD TRAP: type=e (Page Fault) rp=f065bef0 addr=100c
> occurred in module "genunix" due to an illegal access to a user address
> 0xe16eb510:
> 
> 0xe16eb0f0:     ksh:
> 0xe16ebd50:     Page Fault
> 0xe1a3e7f0:     Bad kernel fault at addr=0x100c
> 0xe1a3e3d0:     pid=21650, pc=0xfe8d5027, sp=0xe34ca0c8, eflags=0x10206
> 0xe1a3d290:
> eip(fe8d5027), eflags(10206), ebp(f065bf38), uesp(e34ca0c8), esp(f065bf20)
> 0xe1a3def0:     eax(e34ca820), ebx(e34957c0), ecx(e1be8568), edx(e34957c0),
> esi(1000), edi(feca2174)
> 0xe1a3dad0:     cr0(8005003b), cr2(100c), cr3(8aae000)
> 0xe1a3d6b0:     cs(158) ds(160) ss(bf4c) es(160) fs(1a8) gs(1b0)
> 0xe1a3b490:
> 0xe1a3b073:     f065be24 unix:die+87 (e, f065bef0, 100c, 1, feca2174, 1000,
> 160)
> 
> 0xe1a3bcd3:     f065bedc unix:trap+405 ()
> 0xe1a3b8b3:     f065bef0 unix:_cmntrap+94 (e34c0160, 160, feca2174)
> 0xe1a3a773:     f065bf38 genunix:vn_rele+7 ()
> 0xe1a3a353:     f065bf4c genunix:fork_fail+b4 (e34ca0c8)
> 0xe1a3ab93:     f065bf78 genunix:cfork+12a ()
> 0xe1a38a53:     f065bf88 genunix:fork+c ()
> 0xe1a38630:
> 0xe1a38213:     syncing file systems...
> 0xe1a38e73:      done
> 0xe1a370d3:     dumping to /dev/dsk/c1d0s0, offset 429850624
> vpanic(0xfe839a2c,0xf065bdf0) + 0
> panic(0xfe839a2c,0xe,0xfec0102c,0xf065bef0,0x100c,0xfec1da00,0xfec011c8) + f
> die(0xe,0xf065bef0,0x100c,0x1,0xfeca2174,0x1000) + 87
> trap(0xf065bef0,0x100c,0x1) + 405
> TRAP TYPE e = PGFLT; hardware error code 0 address of regs f065bef0
> vn_rele(0x1000) + 7
> fork_fail(0xe34ca0c8,0xfec2607c,0xe34cc7e0,0xe34957c0,0x0,0x8cdf) + b4
> cfork(0x0,0x0,0xf065bfb4,0xfe800a2d,0x0,0x80479e8) + 12a
> fork(0x0,0x80479e8,0x8047a3c,0xe34957c0,0xf065bfb4,0xfe8008f8) + c
> watch_do_syscall() + be
> 
> >From unix.1 vmcore.1
> --------------------
> panic[cpu0]/thread=e204e5c0:
> 0xe1af4550:     BAD TRAP: type=e (Page Fault) rp=f0605eec addr=1000
> occurred in module "TS" due to an illegal access to a user address
> 0xe14f5090:
> 
> 0xe16fc370:     mkfile:
> 0xe16eca70:     Page Fault
> 0xe16ec230:     Bad kernel fault at addr=0x1000
> 0xe16eb0f0:     pid=234, pc=0xfe8f49e5, sp=0xe2045078, eflags=0x10206
> 0xe16eb930:
> eip(fe8f49e5), eflags(10206), ebp(f0605f48), uesp(e2045078), esp(f0605f1c)
> 0xe1a3e3d0:     eax(1000), ebx(e1fe3b00), ecx(e2045078), edx(ffffff00),
> esi(e204
> e5c0), edi(e2045078)
> 0xe1a3ec10:     cr0(8005003b), cr2(1000), cr3(27e6000)
> 0xe1a3e7f0:     cs(158) ds(160) ss(e5c0) es(160) fs(1a8) gs(1b0)
> 0xe1a3d6b0:
> 0xe1a3d293:     f0605e20 unix:die+87 (e, f0605eec, 1000, 0, e2045078,
> e204e5c0,
> 160)
> 0xe1a3def3:     f0605ed8 unix:trap+405 ()
> 0xe1a3dad3:     f0605eec unix:_cmntrap+94 (f0600160, fea20160, e2045078)
> 0xe1a3b8b3:     f0605f48 TS:ts_preempt+75 ()
> 0xe1a3b493:     f0605f60 unix:preempt+ae (f0605f9c)
> 0xe1a3b073:     f0605fa4 genunix:post_syscall+39e ()
> 0xe1a3bcd0:
> 0xe1a3ab93:     syncing file systems...
> 0xe1a3a353:      done
> 0xe1a38213:     dumping to /dev/dsk/c1d0s0, offset 429850624
> vpanic(0xfe839a2c,0xf0605dec) + 0
> panic(0xfe839a2c,0xe,0xfec0102c,0xf0605eec,0x1000,0xe152ed08,0xfec011c8) + f
> die(0xe,0xf0605eec,0x1000,0x0,0xe2045078,0xe204e5c0) + 87
> trap(0xf0605eec,0x1000,0x0) + 405
> TRAP TYPE e = PGFLT; hardware error code 0 address of regs f0605eec
> ts_preempt(0xe204e5c0) + 75
> preempt(0xf0605f9c,0xe2045078,0xe204e5c0,0x7fffffff,0x0,0xe1ebf9f0) + ae
> post_syscall(0x2000,0xe204e5c0) + 39e
> watch_do_syscall() + f9
> 
> >From unix.2 vmcore.2
> --------------------
> panic[cpu1]/thread=e205a900:
> 0xe16fcbb0:     BAD TRAP: type=e (Page Fault) rp=f0628eec addr=1000
> occurred in module "TS" due to an illegal access to a user address
> 0xe16fc370:
> 
> 0xe16ece90:     mkfile:
> 0xe16ec650:     Page Fault
> 0xe16eb0f0:     Bad kernel fault at addr=0x1000
> 0xe16eb930:     pid=228, pc=0xfe8f49e5, sp=0xe204c7a8, eflags=0x10206
> 0xe1a3e3d0:
> eip(fe8f49e5), eflags(10206), ebp(f0628f48), uesp(e204c7a8), esp(f0628f1c)
> 0xe1a3dad0:     eax(1000), ebx(e1f4c620), ecx(e204c7a8), edx(ffffff00),
> esi(e205
> a900), edi(e204c7a8)
> 0xe1a3d6b0:     cr0(8005003b), cr2(1000), cr3(5443000)
> 0xe1a3d290:     cs(158) ds(160) ss(a900) es(160) fs(1a8) gs(1b0)
> 0xe1a3def0:
> 0xe1a3b073:     f0628e20 unix:die+87 (e, f0628eec, 1000, 1, e204c7a8,
> e205a900,
> 160)
> 0xe1a3bcd3:     f0628ed8 unix:trap+405 ()
> 0xe1a3b8b3:     f0628eec unix:_cmntrap+94 (f0620160, fea20160, e204c7a8)
> 0xe1a3b493:     f0628f48 TS:ts_preempt+75 ()
> 0xe1a3a353:     f0628f60 unix:preempt+ae (f0628f9c)
> 0xe1a3ab93:     f0628fa4 genunix:post_syscall+39e ()
> 0xe1a3a770:
> 0xe1a38633:     syncing file systems...
> 0xe1a38e73:      1
> 0xe1a38a53:      done
> 0xe1a374f3:     dumping to /dev/dsk/c1d0s0, offset 429850624
> vpanic(0xfe839a2c,0xf0628dec) + 0
> panic(0xfe839a2c,0xe,0xfec0102c,0xf0628eec,0x1000,0xe152ed08,0xfec011c8) + f
> die(0xe,0xf0628eec,0x1000,0x1,0xe204c7a8,0xe205a900) + 87
> trap(0xf0628eec,0x1000,0x1) + 405
> TRAP TYPE e = PGFLT; hardware error code 0 address of regs f0628eec
> ts_preempt(0xe205a900) + 75
> preempt(0xf0628f9c,0xe204c7a8,0xe205a900,0x7fffffff,0x0,0xe1be4328) + ae
> post_syscall(0x2000,0xe205a900) + 39e
> watch_do_syscall() + f9
> _______________________________________________
> sunmanagers mailing list
> sunmanagers@sunmanagers.org
> http://www.sunmanagers.org/mailman/listinfo/sunmanagers
_______________________________________________
sunmanagers mailing list
sunmanagers@sunmanagers.org
http://www.sunmanagers.org/mailman/listinfo/sunmanagers
Received on Mon Jul 15 10:38:35 2002

This archive was generated by hypermail 2.1.8 : Thu Mar 03 2016 - 06:42:49 EST